thanks for your time Charlie
thanks for your time Charlie
You can add google push in a sandbox and get NFC
The article you’ve submitted was published yesterday so it’s not taking into account the bills being pulled. Also the website you’re posting has massive third party big tech such as Google.
But okay, let’s all upvote Saki’s copy paste of a URL and ignore mine done first with original and accurate info. Cool story bro
Session not only is privacy but also free speech! It’s a huge problem that the government controls DNS or domain names that point to IP addresses. You don’t own a domain, they rent it to you.
Our team has developed software for a distribution bot using Session messenger because Session has blockchain based DNS on top of onion routed privacy. This video explains how it works: https://video.simplifiedprivacy.com/sessionbot/
Great job anonymous poster!
Did you get Pay with Moon to work for bitcoin WITHOUT linking it to Coinbase account?
right on, maybe we can get a list going
thanks for your service
I am fairly new to this community, so I have no official say. But has Core considered distributing Monero binaries via Nostr, IPFS, Arweave, akash, Session, or other decentralized means? This would allow for more decentralization of staff and censorship resistance than a credit card government domain. Also could be both. just more options. And then different core members could do the different official channels, which would quickly raise alarm bells if Nostr has a different binary than getmonero.org
You’re correct that UDP is not “suspicious”, but it is easier to track from an ISP that a VPN is being used. The video stressed that this was a risk for those concerned with censorship from the ISP for using a VPN. Even the WireGuard official website says this is not ideal for obfuscation.
Regarding the VPN→Tor, it places a greater level of trust on the VPN provider to properly implement WireGuard key rotation. If the VPN provider is using a dedicated server, such as Mullvad, then that’s great. Other VPN providers are shady and use VM clouds from popular datacenters. Cloud computing shares RAM resources and thus it’s keeping in memory longer the association. It’s also possible that the same datacenter can be hosting a Tor node and a VPN. Many VPNs use the same third party datacenters. It’s not that WireGuard is inherently insecure, it’s that there is no benefit to using during Tor for increased risk. And these increased risks all revolve around more trust.
We are trying to build trust in our website, it’s a business. Gotta start somewhere, everyone is unknown at first
wow do you have a source link on the SoC backdoors huawei?
interesting perspective
I’m not sure I follow your question. The XMR nostr client is not yet finished, but once it is, I would assume likely any wallet could be used
The issue with WireGuard depends on your situation. So for low risk activities such as watching a Netflix video, it’s fine. It’s faster and convenience. However, people should be aware of the trade-offs associated with this:
There’s logging of IPs built into the identity of the users, such that it stores it in memory after the connection is closed. This is NOT an issue for low risk activity like video games, but IS an issue for Tor users as they change circuits every 10 minutes. Frequently VPN companies outsource their servers to the same third party servers as Tor VPS hosts and as other VPNs. For example, some well known VPNs, Mullvad and IVPN do share some of the same third party providers. And other providers don’t have dedicated servers and use cloud VMs. Keeping your IP in memory from one Tor circuit to another with the same servers providers is a huge risk especially if it involves cloud hosting as it’s shared memory. Depending on the VPS or provider, it could overlap. The video further explains that there is no speed benefit to using WireGuard over OpenVPN with Tor. So you get no bonus for the risk.
There was other stuff covered in the video regarding UDP packets being more obvious to the ISP for a VPN useage, and the potential to put that through a UDP→TCP tunnel with a link to where to find that.
Future videos will have me in a smaller box in the corner, and larger graphics
Hey thanks for your time. So I didn’t realize this, but some of the self hosted simpleX servers need a code to enter if the person set it to require that. So a bunch of the URLs I had, turned out to reject off this code. We will be posting a self-hosted SMP server with the code shortly, I’ll ping you here when it does
your argument is essentially you don’t like me. so therefore I shouldn’t be posting videos
Yeah I suppose. But how’s a website ever start then? Monero.town was once unknown to both of us
Yeah, we’re going to be doing a Simplified Privacy podcast starting soon. A mix of educational segments and interviews. And yeah like you mentioned mentioning Monero, but not solely focused on Monero